Solving Phishing from the Root

By |April 3rd, 2019|Categories: Articles|Tags: , , |

Spear phishing. It’s one of the more vicious methods used by today’s cyber criminals to compromise networks. Phishing related attacks have been a favorite of the hackers tool kit for years. And these kinds of attacks are becoming more common and more sophisticated over time. What is Spear Phishing? In its most basic definition, phishing is an attempt to illicitly obtain [...]

Virtual Desktop (VDI) Authentication

By |December 20th, 2018|Categories: Articles|Tags: , , , |

The Bring Your Own Device (BYOD) approach is highly embraced by organizations, connecting users to corporate networks to reduce costs or as an easy solution for remote workers. The main beneficiaries of the trend are Virtual Desktop Infrastructure (VDI) such as Citrix, VMware and Microsoft,  For many organizations and companies, Virtual Desktops provide an interesting option to connect their employees to [...]

Password- Based Authentication: Vulnerabilities And Alternative Solutions

By |December 5th, 2018|Categories: Articles|Tags: , , , , , |

The password has been the staple of authentication for years. While passwords are still very much a part of our information technology landscape, they have been on the decline for more than a decade. “There is no doubt that over time, people are going to rely less and less on passwords,” adding that passwords “just don’t meet the challenge for anything [...]

VPN MFA – The Gateway to the Kingdom

By |November 22nd, 2018|Categories: Articles|Tags: , , |

Enterprises have long used Virtual Private Networks (VPN) to protect their systems and provide a secure work environment. In today’s dynamic business climate, VPN’s have become even more essential. Private networks are now commonly used for organizations that want to give their employees remote, unfettered access to their private servers. With the security and flexibility they provide, it’s no wonder why [...]

The UN Unexpected Example of Poor Password Management

By |October 4th, 2018|Categories: Articles|Tags: , , , |

A couple weeks ago, we covered the West Australian government’s security audit here on the Octopus Blog. The section of the governmental audit’s research into cyber security practices unveiled some pretty disturbing facts. Given the opportunity, users will choose the most obvious, easiest to guess passwords, leaving them wide-open targets for cyber criminals. While the size and scope of this phenomenon [...]

Certificates and Inherit Trust

By |September 23rd, 2018|Categories: Articles|Tags: , , , |

On the Octopus Blog, we’ve delved quite a bit into the vulnerabilities of contemporary encryption standards. The system of Public Key Infrastructure (PKI) which forms the basis of most of the worlds authentication platforms, while presenting a powerful, easy to use encryption model, still left several holes through which attackers can breach networks and steal identities. Perhaps the single biggest problem [...]

How to Secure the Health Industry

By |August 27th, 2018|Categories: Articles|Tags: , , |

Data breaches at healthcare organizations are some of the most critical security incidents. They put very damaging information at the disposal of cybercriminals and malicious actors. A slate of regulations in different jurisdictions classify health data as highly sensitive and penalize organizations that mishandle the information or fail to protect it against hackers. An example is the Health Insurance Portability and [...]

Private Keys Vulnerabilities to Side Channel Attacks

By |August 23rd, 2018|Categories: Articles|Tags: , |

The Public Key Infrastructure has been the staple of cryptography for over forty years. The simple and ingenious system introduced to the world of information technology the concept of “asymmetric” encryption; a way in which a message can be encrypted, but only unlocked by one particular user. While the public key is accessible to all and can be used to encrypt [...]

Before you Get a Physical Security Token – What you Need to Know

By |August 2nd, 2018|Categories: Articles|Tags: , , , , |

Last week Google announced that it will create its own physical universal second-factor authenticator that leverages the FIDO Alliance (Fast Identity Online). FIDO was designed to put an end to the tradeoff between fast, easy access on the one hand, and robust authentication security on the other. With the authentication scheme growing in popularity, several tech manufacturers like Yubico and Feitian [...]

Using Social Networks as an Identity Provider

By |July 25th, 2018|Categories: Articles|Tags: , , |

One of the major innovations in authentication today has come through harnessing our social accounts as identity providers. Utilizing our social applications to confirm our identities has certainly streamlined access to tools and services. Data has shown that nearly all users have at one point encountered a social login option, and about half use them regularly. The question is: what is [...]

Windows Hello for Business – Review

By |July 19th, 2018|Categories: Articles|Tags: , , , |

Just a few years ago, biometric logins were the stuff of science fiction and technophiles. Today, the market has produced a slew of tools that have made biometrics available for the common user. Microsoft’s biometric solution, Windows Hello for Business (WHB), is one of the industries most successful platforms designed for enterprise-wide use. Let’s start with the basics: What Does it [...]

How Does Passwordless Authentication Work? (Part 1)

By |July 9th, 2018|Categories: Articles|Tags: , , |

Being in the industry of authentication, we get quite a lot of questions on the topic, especially on how to get rid of passwords while maintaining a high level of assurance. To make access to this information a bit easier, we decided to put out a blog series with answers to the most commonly asked questions. Here’s the rundown of ongoing [...]

Cloud IAM and How to Choose Your Solution

By |July 4th, 2018|Categories: Articles|Tags: , , |

The shift to the cloud continues to be one of the biggest trends in Identity and Access Management (IAM). Indeed, industry leaders have long pointed to the strengths of cloud-based options for managing digital identifies, often not available with on-premises options. But for managers seeking to develop a data security strategy for their organizations, trying to navigate through the slew of [...]

Howdy,
Search exact
Search sentence
Buy Premium Version to add more powerful tools to this place. https://wpclever.net/downloads/wp-admin-smart-search